Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 504-508.doi: 10.11896/jsjkx.200700210

• Information Security • Previous Articles     Next Articles

Routing Directory Server Defined by Smart Contract

WANG Xiang-yu1, YANG Ting2   

  1. 1 School of Computer Science and Engineering,Electronic Science and Technology of China,Chengdu 611731,China
    2 School of Computer Science and Engineering,Electronic Science and Technology of China,Chengdu 611731,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:WANG Xiang-yu,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include blockchain and cryptography.
    YANG Ting,born in 1975,associate professor.His main research interests include blockchain and cyber security.
  • Supported by:
    NSFC:Research on Airline Passenger Luggage Tracking Technology Based on Electronic Tag(U2033212).

Abstract: The routing directory server plays an important role in the anonymous network,which is restricted by its centralization.Currently,the main problems are reflected in the scalability of the system,the security of the data,and the flexibility of the network.According to the characteristics of the directory server,the following three functions are implemented by smart contracts:user registration authorization,routing information auction,and the routing information encryption with decryption.Expe-rimentsprove that the smart contract proposed in this paper can replace the interconnected routing directory server in function.The smart contract can not only complete the transaction process of routing information,but also perform a good security in performance.The addition of smart contracts implements the function of the directory server on a decentralized blockchain.The solution improves the scalability of the network,data security and network flexibility.In addition,the solution means more energetic.

Key words: Anonymous network, Auction, Authorized authentication, Routing directory server, Smart contract

CLC Number: 

  • TP393
[1] HE D,ZEADALLY S,KUMAR N,et al.Anonymous Authentication for Wireless Body Area Networks With Provable Security[J].IEEE Systems Journal,2017,11(4):2590-2601.
[2] CATALANO D,FIORE D,GENNARO R.A certificateless approach to onion routing[J].International Journal of Information Security,2017,16(3):327-343.
[3] LIU X,WANG N.An overview of anonymous communication[J].Computer Applications,2010,30(3):719-722.
[4] TAN Q,GAO Y,SHI J,et al.Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services[J].IEEE Internet of Things Journal,2019,6(2):1584-1593.
[5] CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[6] HAMOUID K,ADI K.Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority[J].Peer-to-Peer Networking and Applications,2019,12(5):1137-1155.
[7] HAGHIGHI M S,AZIMINEJAD Z.Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs[J].IEEE Internet of Things Journal,2020,7(4):2582-2590.
[8] TSAI J L,LO N W.Secure Anonymous Key DistributionScheme for Smart Grid[J].IEEE Transactions on Smart Grid,2016,7(2):906-914.
[9] RAHMAN M A,HOSSAIN M S,LOUKAS G,et al.Block-chain-based Mobile Edge Computing Framework for Secure Therapy Applications[J].IEEE Access,2018(99):1-1.
[10] ZHUMABEKULY AITZHAN N,SVETINOVIC D.Securityand Privacy in Decentralized Energy Trading Through Multi-Signatures,Blockchain and Anonymous Messaging Streams[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):840-852.
[11] WAN S.Topology hiding routing based on learning with errors[J].Concurrency and Computation:Practice and Experience,2020,e5740.
[12] SAKAI K,SUN M T,KU W S,et al.On Anonymous Routing in Delay Tolerant Networks[J].IEEE Transactions on Mobile Computing,2019,18(12):2926-2940.
[13] ZHAO K,XING Y H.Overview of research on security of the Internet of Things driven by blockchain technology [J].Information Network Security,2017(5):1-6.
[14] KANG J,YU R,HUANG X,et al.Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains[J].IEEE Transactions on Industrial Informatics,2017(6):1-1.
[15] LEI A,CRUICKSHANK H,CAO Y,et al.Blockchain-BasedDynamic Key Management for Heterogeneous Intelligent Transportation Systems[J].IEEE Internet of Things Journal,2017(99):1-1.
[16] MAXWELL G,POELSTRA A,SEURIN Y,et al.SimpleSchnorr multi-signatures with applications to Bitcoin[J].Designs,Codes and Cryptography,2019,87(9).
[17] ZOU B.Summary of Auction Theory[J].Science Consulting (Technology·Management),2013(11):19-20.
[18] LEI A,CRUICKSHANK H,CAO Y,et al.Blockchain-BasedDynamic Key Management for Heterogeneous Intelligent Transportation Systems[J].IEEE Internet of Things Journal,2017(99):1-1.
[19] MESHRAM C,LEE C C,LI C T,et al.A secure key authentication scheme for cryptosystems based on GDLP and IFP[J].Soft Computing,2016,21(24):7285-7291.
[20] CHEN Z,QI F,YE C Y.Research on a cloud data encryption scheme based on national secret algorithm[J].Information Security Research,2018,4(7):646-651.
[21] HE D,ZEADALLY S,KUMAR N,et al.Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures[J].IEEE Transactions on Information Forensics & Security,2016,11(9):2052-2064.
[22] YAGHMAEE M H,BARABADI B,ALISHAHI S,et al.Incentive cloud-based demand response program using game theory in smart grid[C]// Electrical Power Distribution Networks Conference.IEEE,2016.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305.
[3] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[4] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[5] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[6] DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30.
[7] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[8] GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316.
[9] GUO Shang-tong, WANG Rui-jin, ZHANG Feng-li. Summary of Principle and Application of Blockchain [J]. Computer Science, 2021, 48(2): 271-281.
[10] CHEN Zi-min, LU Yi-wen, GUO Yan. High-speed Replay of Ethereum Smart Contracts Based on Block Parallel [J]. Computer Science, 2021, 48(2): 289-294.
[11] WANG Hui, CHEN Bo, LIU Yu-xiang. Research on Personnel File Management System Based on Blockchain [J]. Computer Science, 2021, 48(11A): 713-718.
[12] DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508.
[13] LING Fei, CHEN Shi-ping. Shared Digital Credits Management Mechanism of Enterprise Alliance Based on Blockchain [J]. Computer Science, 2021, 48(11A): 533-539.
[14] TU Liang-qiong, SUN Xiao-bing, ZHANG Jia-le, CAI Jie, LI Bin, BO Li-li. Survey of Vulnerability Detection Tools for Smart Contracts [J]. Computer Science, 2021, 48(11): 79-88.
[15] XIAO Feng, ZHANG Peng-cheng, LUO Xia-pu. Ethereum Smart Contract Bug Detection and Repair Approach Based on Regular Expressions, Program Instrumentation and Code Replacement [J]. Computer Science, 2021, 48(11): 89-101.
Full text



No Suggested Reading articles found!